CATALANO, Dario
 Distribuzione geografica
Continente #
NA - Nord America 2.303
EU - Europa 1.175
AS - Asia 758
SA - Sud America 219
AF - Africa 99
OC - Oceania 9
Continente sconosciuto - Info sul continente non disponibili 3
Totale 4.566
Nazione #
US - Stati Uniti d'America 2.191
SG - Singapore 396
IT - Italia 324
CN - Cina 279
IE - Irlanda 268
BR - Brasile 205
UA - Ucraina 196
CA - Canada 100
RU - Federazione Russa 82
DE - Germania 81
SN - Senegal 65
FI - Finlandia 58
AT - Austria 45
FR - Francia 34
GB - Regno Unito 21
CI - Costa d'Avorio 18
SE - Svezia 16
IN - India 15
CZ - Repubblica Ceca 11
UZ - Uzbekistan 11
HK - Hong Kong 10
AU - Australia 9
BD - Bangladesh 8
AR - Argentina 7
MX - Messico 7
NL - Olanda 7
ES - Italia 6
IQ - Iraq 6
TR - Turchia 6
CH - Svizzera 5
MA - Marocco 5
DK - Danimarca 4
ZA - Sudafrica 4
DZ - Algeria 3
EU - Europa 3
GR - Grecia 3
JP - Giappone 3
LU - Lussemburgo 3
PK - Pakistan 3
RO - Romania 3
TW - Taiwan 3
VN - Vietnam 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
BG - Bulgaria 2
CO - Colombia 2
DO - Repubblica Dominicana 2
EC - Ecuador 2
HN - Honduras 2
HU - Ungheria 2
JO - Giordania 2
LB - Libano 2
NG - Nigeria 2
NP - Nepal 2
PE - Perù 2
SA - Arabia Saudita 2
BY - Bielorussia 1
CL - Cile 1
EG - Egitto 1
KH - Cambogia 1
LI - Liechtenstein 1
LT - Lituania 1
PA - Panama 1
PS - Palestinian Territory 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
Totale 4.566
Città #
Santa Clara 611
Chandler 307
Dublin 268
Singapore 235
Jacksonville 199
Boardman 109
Catania 91
Nanjing 76
Andover 75
Toronto 75
Cambridge 72
Lawrence 69
Dakar 65
Ashburn 52
Nuremberg 52
Helsinki 48
Milan 43
San Mateo 34
Des Moines 33
The Dalles 33
Chicago 32
Council Bluffs 27
Saint Petersburg 27
Wilmington 25
Rome 24
Hebei 22
Jiaxing 20
Nanchang 20
Ottawa 19
Abidjan 18
Houston 16
Shenyang 16
São Paulo 14
Vienna 14
Beijing 13
Changsha 13
San Francisco 12
Tianjin 12
Los Angeles 11
Brooklyn 10
Hefei 10
Jinan 9
Reggio Calabria 9
Brno 8
Kunming 8
Guangzhou 7
Milazzo 7
Norwalk 7
Civitanova Marche 6
Hong Kong 6
Moscow 6
Palermo 6
Pune 6
Valverde 6
Washington 6
Zhengzhou 6
Belo Horizonte 5
Brasília 5
Frankfurt am Main 5
Giardini-Naxos 5
Messina 5
New York 5
Ningbo 5
Ravenna 5
Seattle 5
Tashkent 5
Aachen 4
Aci Catena 4
Castiglione Olona 4
Cesa 4
Dhaka 4
Fremont 4
Goiânia 4
Hangzhou 4
Johannesburg 4
Lappeenranta 4
London 4
Madrid 4
Maletto 4
Melbourne 4
Munich 4
Niscemi 4
Paris 4
Shanghai 4
São José dos Campos 4
Atlanta 3
Bari 3
Borgosesia 3
Campinas 3
Chennai 3
Curitiba 3
Florianópolis 3
Fort Worth 3
Grafing 3
Manchester 3
Melzo 3
Mexico City 3
Pelotas 3
Ribeirão Preto 3
Rio de Janeiro 3
Totale 3.196
Nome #
Verifiable Pattern Matching on Outsourced Texts 104
Practical functional encryption for quadratic functions with applications to predicate encryption 96
MonZa: Fast Maliciously Secure Two Party Computation on Z_(2^k) 93
Algebraic (trapdoor) one-way functions: Constructions and applications 90
Fully non-interactive onion routing with forward secrecy 89
A certificateless approach to onion routing 78
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 77
Algebraic (Trapdoor) One-Way Functions and Their Applications 77
Zero-Knowledge Sets with Short Proofs 75
Trapdoor Hard-To-Invert Group Isomorphisms and their Applications to Password-based Authentication 75
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions 75
Practical homomorphic MACs for arithmetic circuits 74
A Color Opponency Watermarking Scheme for Digital Images 71
Coercion-Resistant Electronic Elections 70
On the security notions for homomorphic signatures 69
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications 68
Hybrid Commitments and their Applications to Zero Knowledge Proof Systems 67
A Fair Micro-Payment Scheme for Profit Sharing in a P2P Network 67
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings 66
Anamorphic Encryption: New Constructions and Homomorphic Realizations 64
Coercion-Resistant Electronic Elections 64
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 64
Wildcarded Identity-Based Encryption 63
Paillier's Trapdoor Functions Hides up to O(N) bits 63
Privacy-Preserving Fingercode Authentication 63
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results 62
Labeled homomorphic encryption: Scalable and privacy-preserving processing of outsourced data 62
Searchable Encryption Revisited: Consistency Conditions, Relation to Anonymous IBE, and Extensions 60
Homomorphic Signatures with Efficient Verification for Polynomial Functions. 60
Computing inverses over a shared secret modulus 60
Efficient Distributed Computation Modulo a Shared Secret'' 60
Fully Non-interactive Onion Routing with Forward-Secrecy 58
Adaptive Pseudofree Groups and Their Applications 57
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 57
An Efficient Algorithm for the Approximate Median Selection Problem 57
Practical Homomorphic Message Authenticators for Arithmetic Circuits 57
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality 57
A P2P Market Place based on Aggregate Signatures 56
Verifiable Random Functions from Identity based Key Encapsulation 56
Constant Round Authenticated Group Key Agreement via Distributed Computation 55
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions 54
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011 54
Off-line/on-line signatures revisited: A general unifying paradigm, efficient threshold variants and experimental results 54
Paillier's Cryptosystem Revisited 53
Inner-Product Functional Encryption with Fine-Grained Access Control 53
Zero-Knowledge Sets with Short Proofs 51
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys 51
Vector commitments and their applications 51
Certificateless Onion Routing 51
IPAKE: Isomorphisms for Pasword-based Authenticated Key Exchange 51
Robust watermarking for Images Based on Colors Manipulation 51
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations 51
Multiparty Computation Method 50
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. 50
New efficient and secure protocols for Verifiable Signature Sharing and other applications 50
Bandwidth-Efficient Threshold EC-DSA 50
Identity Based Encryption Gone Wild 49
Preface [Security and cryptography for networks] 49
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework 48
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data 48
Homomorphic Signatures and Message Authentication Codes. SCN 2014: 514-519 48
Verifiable Pattern Matching on Outsourced Texts [2016] 48
Double-authentication-preventing signatures in the standard model 47
The Bit Security of Paillier's Encryption Scheme and its Applications 47
Hybrid Trapdoor Commitments and their Applications 47
Learning SAT-k NF formulas from Membership queries 47
New efficient and secure protocols for Verifiable Signature Sharing and other applications 47
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 45
Efficient Network Coding Signatures in the Standard Model 43
Metodo di multiparty computation 42
The Hardness of Hensel Lifting: the Case of RSA and Discrete Logarithm 42
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions 41
Improved On-Line/Off-Line Threshold Signatures 40
Generalizing Homomorphic MACs for Arithmetic Circuits. 38
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness 38
Double-authentication-preventing signatures in the standard model 37
Adaptively Secure Single Secret Leader Election from DDH 36
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security 34
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures 33
Limits of Black-Box Anamorphic Encryption 28
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups 27
Chainable Functional Commitments for Unbounded-Depth Circuits 27
Efficient and Universally Composable Single Secret Leader Election from Pairings 26
Robust watermarking for images based on color manipulation 25
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions 4
Totale 4.692
Categoria #
all - tutte 16.959
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.959


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202020 0 0 0 0 0 0 0 0 0 0 0 20
2020/2021311 3 35 45 2 121 5 35 1 37 2 17 8
2021/2022544 61 74 0 5 76 0 77 21 43 1 15 171
2022/2023912 71 39 20 72 81 162 1 188 229 8 31 10
2023/2024453 36 42 19 33 16 27 2 21 2 108 61 86
2024/20251.924 17 149 131 62 446 298 89 217 132 157 136 90
Totale 4.692